Gentoo: samba multiple vulnerabilities
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200303-11 - - ---------------------------------------------------------------------
- - ---------------------------------------------------------------------
- From advisory:
"The SuSE security audit team, in particular Sebastian Krahmer, has found a flaw in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server."
"A buffer overrun condition exists in the SMB/CIFS packet fragment re-assembly code in smbd which would allow an attacker to cause smbd to overwrite arbitrary areas of memory in its own process address space. This could allow a skilled attacker to inject binary specific exploit code into smbd."
Read the full advisory at:
SOLUTION
It is recommended that all Gentoo Linux users who are running net-fs/samba upgrade to samba-2.2.8 as follows:
emerge sync emerge s...Read the Full Advisory
Resolution
References
Availability
Concerns
Background